Professional Documents
Culture Documents
Cyber Security
Cyber security/ electronic protecting internet connected systems such as computers, servers, mobile
information security / devices, electronic systems, networks and data from malicious attacks
information technology security
Cyber technology that includes systems, networks, programs and data
Security security of systems, networks, applications and information.
Cyberspace
Cyberspace interconnected digital technology
term cyberspace By science fiction’ author William Gibson used in 1982 in the short story ‘Burning
Chrome’
1987 in the United States, John McAfee founded the McAfee company
1987 first two antivirus utilities were released
Flushot Plus by Ross Greenberg
Anti4us by Erwin Lanting
1988 American computer scientist, Robert Morris, wrote a program for testing the
size of the internet.
The program became the first famous network virus and named as Moris worm
1988 In Germany, Tjark Auerbach founded Avira
2000 IT act
Received the assent of the President on 9th June 2000
The Act came into force on 17th October 2000
2008 IT amendment act
2013 Cyber policy of India
2014 National Cyber Security Coordinator First - Dr. Gulshan Roy
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 1
For- UPSC / MPPSC
Cyber crime
• Cybercrime is a crime that involves a computer and a network. The computer may have been used to
commit a crime, or it could be the target.
• According to NITI Aayog there are four types of cyber crimes
1. Cyber Espionage
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 2
For- UPSC / MPPSC
• The act of obtaining secret information without the permission of the holder through the use of malicious
software, including cracking techniques, Trojan horses and spyware.
2. Cyber Attack
• Any type of offensive maneuver that targets computer information systems infrastructure, computer
networks.
3. Cyber Terrorism
• Terrorist act related to cyber space by using cyber techniques is called cyber terrorism.
4. Cyber War
• The action of a nation-state or its proxy entering another country's computer or network.
6. Denial of Service(DoS/DDoS)
• An attack meant to shut down a machine or network, making it inaccessible to its intended users
11. URLinterpretation
• It is a type of attack where we can change parts of the URL, and a web server can be created which can
deliver web pages for which it is not authorized to browse.
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 3
For- UPSC / MPPSC
• It is a type of attack that allows an attacker to intercept the connection between the client and the server
and act as a bridge between them.
• Due to this, an attacker becomes able to read, insert and modify the data in the intercepted connection.
Malware
• Malware is an abbreviation for malicious software.
• Malware is intrusive software designed to damage and destroy computers and computer systems.
• Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and
ransomware.
1. Virus
• Vital information resource under sieze.
• It is a software program that enters the computer and makes many copies of itself or does the work of
erasing, corrupting or changing the data.
• The first virus to spread on the network was the Creeper developed by Bob Thomas virus which
spread an ARPnet.
• The first virus to spread on computer was Alk Cloner.
• C brain was the first virus to spread on IBM computers.
Major Computer Virus
c-brain
• Considered to be the first computer virus for the IBM Personal Computer (IBM PC)
• Written by Amjad Farooq Alvi and Basit Farooq Alvi, Pakistan.
Crypto Locker (2013)
• Released in September 2013, Cryptolocker spread via email attachments and encrypted user's files so
that they could not access them.
• In June 2014, Evgeny Bogachev, the leader of the hackers behind Cryptolocker, was killed in
Operation Tovar.
ILOVEYOU (2000)
• The virus came in an email with a subject line that said 'I love you.
• Recorded it in the Guinness World Records as the most spreading virus ever.
My Doom (2004)
• My Doom is considered to be the most harmful virus ever.
• The fastest spreading email-based worm ever.
Storm Worm(2006)
• When, people open the email and click on the link of the news and that's when the problems start.
• The storm worm was a Trojan horse that infected computers.
Michel Angelo(1991)
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 4
For- UPSC / MPPSC
• This virus ends data on March 6, which is Michelangelo's date of birth. That's why it is also called
'March 6 virus'.
• Michelangelo is classified as a boot sector virus, a type of virus that infects the startup sectors of
storage devices.
Disk washer
• Sent to India in the last month of 1993.
• This virus was so dangerous that it destroyed all the data available in the hard disk.
Jerusalem
• The virus was first detected around 1987 at Hevro University, Jerusalem.
• It was active only on Fridays.
Other viruses
• EventBot, Necurs (botnet), Strendhogg, Dride, Agent Smithy, Gravity Rat, Stuxnet, Flame and Dyuke
Kronos, Wanakry (2016).
2. Worms
• It slows down the speed of the computer by making multiple copies of itself and filling the hard disk
space.
• Slows down the speed of data transfer over the Internet using bandwidth.
3. Trojan Horse
• It appears as a warning of useful softwares
• On downloading it, it enters the computer.
• Additionally it opens the way for other malwares (backdoors)
• It makes unexpected changes to computer settings and unusual activity, even when the computer
should be idle.
Eventbot
Mobile banking Trojan horse
Ex. Scareware, Rouge Security Software.
BlackRock
It can steal information from Social media apps like Facebook WhatsApp and e-commerce apps on the
phone.
4. Back door
This is a method that reject the normal authentication process.
5. Bots
• A bot (Robot) is an automated process that interacts with other network services.
• Common examples of bot programs are crawlers, chat room bots, and malicious bots.
Keylogger
• Tools that record what a person types on a device
Wiper
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 5
For- UPSC / MPPSC
Adware
They get income by showing advertisements in an unwanted manner.
Ransomware
• It prevents any file from being opened on entering in Computer vote and demanding money.
• Ex. Petya, Wannacry, Bad Rabbit.
Spyware
Its function is to enter a computer and keep an eye on all the activities done in that computer.
Salami technique
• In this, so little is taken out of a large amount of money that it becomes difficult to identify it due to no
special effect on the affected person.
• Like 50 to 60 paise theft in each payment
Rootkits
• A rootkit is a program or set of software tools that secretly allows hackers to access and control a
system.
Bootkit
• Advance Rootkit
Vulnerability Scanner
• It allows ethical hackers to find potential flaws and fix them immediately.
• Ex. Nmap (Network mapper), Nessue, Nikto (Scans and test Several web servers for identifying
software that is outdated), Kismet (hacking of wireless LAN wardriving), Netstumbler (Prevent
wardriving).
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 6
For- UPSC / MPPSC
Deepfakes
• An audio or video clip that has been edited and manipulated to appear genuine or believable.
Social Engineering
• It is the use of deception to manipulate individuals to breach security.
Logic Bomb
• It is a type of malware added to a legitimate program that remains dormant until it is triggered by a
specific event.
Zero Trust Security
• This means that by default no one is trusted from inside or outside the network, and verification is
required from everyone trying to gain access to resources on the network.
types of hackers
1. Black Hat
➢ A black-hat hacker is a person who attempts to gain unauthorized
access to a system or network for malicious reasons.
➢ They steal or gain access to passwords, financial information and
other personal data.
3. Grey Hat
➢ Gray hat hackers are in between white and black.
➢ They are people who look for vulnerabilities in systems without
permission but potentially with good intentions.
4. Red Hat
➢ Red Hat is known as the wise man of the hacking world.
➢ They live and act by their own rules
5. Green Hat
➢ Green hat hackers are new hackers and they work every day to
improve their skills so that they can become better.
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 7
For- UPSC / MPPSC
6. Blue Hat
➢ Blue hat hackers are security professionals who are outside organizations.
➢ A security professional invited by Microsoft to find vulnerabilities in Windows.
7. Phreakers
➢ The people who broke into the telephone system were called Phreakers.
8. Script Kiddie
➢ A person who uses existing computer scripts or code to hack a computer that lacks the expertise to write
one's own.
9. Hacktivist
Hacktivism is the use of hacking to promote a political agenda or social change.
VPNs
• VPN stands for Virtual Private Network.
• It is a technology that creates a secure and encrypted connection from a device across a network to the
Internet.
• All cloud service and VPN providers to maintain a series of extensive customer information for at
• least five years
Intrusion Detection System (IDS)
• IDS is a security system that monitors computer systems and network communications.
Firewall
• Firewall works to filter the traffic coming from the Internet, similarly, it strengthens security.
Digital signature
• An electronic, encrypted, stamp of authentication on digital information such as email messages, macros,
or electronic documents.
• A signature confirms that the information originated from the signer and has not been altered.
Honey spots
• These are computers that are intentionally left vulnerable to attack by crackers.
• They are used to capture crackers and identify their techniques.
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 8
For- UPSC / MPPSC
Antivirus
• Antivirus is a software utility program designed to protect the system from internal attacks from
viruses, Trojan horses, spyware, etc.
• First antivirus was Reeper developed by Ray tamilson.
• Major Antivirus- . A Vast, Bitdefender, AVG, Mcfee, Norton, Normal, Panda, Net protector, ViRobot,
Defender, K-7, PC Protector Quik heal etc.
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 9
For- UPSC / MPPSC
(NGO) Centre of Excellence for Cyber Security Research & Development in India
(CECSRDI)
Cyber Security of India (CSI)
National Cyber Security of India (NCS)
Cyber Attacks Crisis Management Plan of India (CACMP)
•
Establishment 2004
Headquarter New Delhhi
Principles Dealing with Cyber Security Incidents
CEO Sanjay Behl, Director General
Parental Department Ministry of Electronics and Information Technology
Note
• Right to privacy has been recognized as one of the fundamental rights by the Supreme Court in KS
Puttaswamy case, 2017.
Add: –Infront of Bank of Baroda, Near Sai Baba Mandir Phoolbagh Gwl (M.P.) Cont. us – 7524821440,7000360672 pg. 12